-
1
-
-
84978405320
-
FARSITE: Federated, available, and reliable storage for an incompletely trusted environment
-
Usenix
-
A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. P. Wattenhofer. FARSITE: Federated, available, and reliable storage for an incompletely trusted environment. In Proc. 5th Symposium on Operating System Design and Implementation (OSDI). Usenix, 2002.
-
(2002)
Proc. 5th Symposium on Operating System Design and Implementation (OSDI)
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.P.10
-
2
-
-
0003508558
-
-
Federal Information Processing Standards Publication 197, U.S. Department of Commerce/National Institute of Standards and Technology, National Technical Information Service, Springfield, Virginia, Nov
-
Advanced encryption standard. Federal Information Processing Standards Publication 197, U.S. Department of Commerce/National Institute of Standards and Technology, National Technical Information Service, Springfield, Virginia, Nov. 2001.
-
(2001)
Advanced Encryption Standard
-
-
-
3
-
-
35048891868
-
Keying hash functions for message authentication
-
Springer-Verlag
-
M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In Proc. Crypto 1996, volume 1109 of Lecture Notes in Computer Science, pages 1–15. Springer-Verlag, 1996.
-
(1996)
Proc. Crypto 1996, Volume 1109 of Lecture Notes in Computer Science
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
85084160254
-
Side-channel attacks on symmetric encryption schemes: The case for authenticated encryption
-
J. Black and H. Urtubia. Side-channel attacks on symmetric encryption schemes: The case for authenticated encryption. In Proc. 11th USENIX Security Symposium, pages 327–338, 2002.
-
(2002)
Proc. 11th USENIX Security Symposium
, pp. 327-338
-
-
Black, J.1
Urtubia, H.2
-
5
-
-
0028482823
-
Checking the correctness of memories
-
M. Blum, W. S. Evans, P. Gemmell, S. Kannan, and M. Naor. Checking the correctness of memories. Algorithmica, 12:225–244, 1994.
-
(1994)
Algorithmica
, vol.12
, pp. 225-244
-
-
Blum, M.1
Evans, W.S.2
Gemmell, P.3
Kannan, S.4
Naor, M.5
-
6
-
-
4444361800
-
The design and implementation of a transparent cryptographic file system for unix
-
G. Cattaneo, L. Catuogno, A. D. Sorbo, and P. Persiano. The design and implementation of a transparent cryptographic file system for Unix. In Proc. USENIX Annual Technical Conference 2001, Freenix Track, pages 199–212, 2001.
-
(2001)
Proc. USENIX Annual Technical Conference 2001, Freenix Track
, pp. 199-212
-
-
Cattaneo, G.1
Catuogno, L.2
Sorbo, A.D.3
Persiano, P.4
-
7
-
-
27544456041
-
Towards constant bandwidth overhead integrity checking of untrusted data
-
D. E. Clarke, G. E. Suh, B. Gassend, A. Sudan, M. van Dijk, and S. Devadas. Towards constant bandwidth overhead integrity checking of untrusted data. In Proc. 26th IEEE Symposium on Security and Privacy, pages 139–153, 2005.
-
(2005)
Proc. 26th IEEE Symposium on Security and Privacy
, pp. 139-153
-
-
Clarke, D.E.1
Suh, G.E.2
Gassend, B.3
Sudan, A.4
van Dijk, M.5
Devadas, S.6
-
8
-
-
85034442744
-
DES modes of operation
-
U.S. Department of Commerce/National Bureau of Standards, National Technical Information Service, Springfield, Virginia
-
DES modes of operation. Federal Information Processing Standards Publication 81, U.S. Department of Commerce/National Bureau of Standards, National Technical Information Service, Springfield, Virginia, 1980.
-
(1980)
Federal Information Processing Standards Publication 81
-
-
-
9
-
-
85077220466
-
Passive NFS tracing of email and research workloads
-
D. Ellard, J. Ledlie, P. Malkani, and M. Seltzer. Passive NFS tracing of email and research workloads. In Proc. Second USENIX Conference on File and Storage Technologies (FAST), pages 203–216, 2003.
-
(2003)
Proc. Second USENIX Conference on File and Storage Technologies (FAST)
, pp. 203-216
-
-
Ellard, D.1
Ledlie, J.2
Malkani, P.3
Seltzer, M.4
-
13
-
-
85033498470
-
SiRiUS: Securing remote untrusted storage
-
ISOC
-
E. Goh, H. Shacham, N. Modadugu, and D. Boneh. SiRiUS: Securing remote untrusted storage. In Proc. Network and Distributed Systems Security (NDSS) Symposium 2003, pages 131–145. ISOC, 2003.
-
(2003)
Proc. Network and Distributed Systems Security (NDSS) Symposium 2003
, pp. 131-145
-
-
Goh, E.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
17
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable secure file sharing on untrusted storage. In Proc. Second USENIX Conference on File and Storage Technologies (FAST), 2003.
-
(2003)
Proc. Second USENIX Conference on File and Storage Technologies (FAST)
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
20
-
-
77952379905
-
Secure untrusted data repository
-
Usenix
-
J. Li, M. Krohn, D. Mazieres, and D. Shasha. Secure untrusted data repository. In Proc. 6th Symposium on Operating System Design and Implementation (OSDI), pages 121–136. Usenix, 2004.
-
(2004)
Proc. 6th Symposium on Operating System Design and Implementation (OSDI)
, pp. 121-136
-
-
Li, J.1
Krohn, M.2
Mazieres, D.3
Shasha, D.4
-
21
-
-
84937407660
-
Tweakable block ciphers
-
Springer-Verlag
-
M. Liskov, R. Rivest, and D. Wagner. Tweakable block ciphers. In Proc. Crypto 2002, volume 2442 of Lecture Notes in Computer Science, pages 31–46. Springer-Verlag, 2002.
-
(2002)
Proc. Crypto 2002, Volume 2442 of Lecture Notes in Computer Science
, pp. 31-46
-
-
Liskov, M.1
Rivest, R.2
Wagner, D.3
-
22
-
-
0042352260
-
Separating key management from file system security
-
ACM Press
-
D. Mazieres, M. Kaminsky, M. Kaashoek, and E. Witchel. Separating key management from file system security. In Proc. 17th ACM Symposium on Operating Systems Principles (SOSP), pages 124–139. ACM Press, 1999.
-
(1999)
Proc. 17th ACM Symposium on Operating Systems Principles (SOSP)
, pp. 124-139
-
-
Mazieres, D.1
Kaminsky, M.2
Kaashoek, M.3
Witchel, E.4
-
23
-
-
0042855815
-
IBM storage tank - A heterogeneous scalable SAN file system
-
J. Menon, D. Pease, R. Rees, L. Duyanovich, and B. Hillsberg. IBM Storage Tank - a heterogeneous scalable SAN file system. IBM Systems Journal, 42(2), 2003.
-
(2003)
IBM Systems Journal
, vol.42
, Issue.2
-
-
Menon, J.1
Pease, D.2
Rees, R.3
Duyanovich, L.4
Hillsberg, B.5
-
29
-
-
35048855067
-
Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance
-
Springer-Verlag
-
P. Rogaway and T. Shrimpton. Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In Proc. 11th International Workshop on Fast Software Encryption (FSE 2004), volume 3017 of Lecture Notes in Computer Science, pages 371–388. Springer-Verlag, 2004.
-
(2004)
Proc. 11th International Workshop on Fast Software Encryption (FSE 2004), Volume 3017 of Lecture Notes in Computer Science
, pp. 371-388
-
-
Rogaway, P.1
Shrimpton, T.2
-
30
-
-
0003629991
-
Secure hash standard
-
U.S. Department of Commerce/National Institute of Standards and Technology, National Technical Information Service, Springfield, Virginia, Apr
-
Secure hash standard. Federal Information Processing Standards Publication 180-1, U.S. Department of Commerce/National Institute of Standards and Technology, National Technical Information Service, Springfield, Virginia, Apr. 1995.
-
(1995)
Federal Information Processing Standards Publication 180-1
-
-
|